Workshops Defence Secure Communications for Field Operations
Defence Full Day Workshop

Quantum-Safe Communications for Field Operations

Tactical communications operate under constraints that most PQC migration guidance ignores: limited bandwidth, intermittent connectivity, battery-powered devices, and real-time latency requirements. This full-day workshop addresses the specific challenges of deploying post-quantum cryptography across tactical radios, satellite terminals, mesh networks, and data links in operational environments where standard enterprise migration approaches do not apply.

Full day (6 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

Military tactical communications span multiple layers: HF and VHF radio nets, UHF SATCOM, L-band tactical data links (Link 16, Link 22), and IP-based mesh networks. Each layer has different bandwidth, latency, and power constraints. ML-KEM key encapsulation produces ciphertexts of 768-1568 bytes depending on parameter set. ML-DSA signatures range from 2420 to 4627 bytes. For Link 16 with its 1.136 Mbps throughput and fixed message formats, integrating PQC requires careful protocol redesign rather than drop-in replacement.

This workshop works through the PQC migration challenges for each tactical communication layer. Participants examine ML-KEM and ML-DSA performance on constrained processors (ARM Cortex-M4/M33 class), bandwidth overhead analysis for narrow-band channels, key management for disconnected and intermittent operations, and hybrid deployment strategies that maintain interoperability with legacy allied systems. The interactive demonstration models PQC overhead impact on a representative tactical network, showing where PQC fits comfortably and where it requires protocol-level adaptation.

What participants cover

  • ML-KEM and ML-DSA performance on constrained processors: ARM Cortex-M4, FPGA, and ASIC benchmarks
  • Bandwidth overhead analysis: PQC ciphertext and signature sizes versus tactical channel capacities
  • Link 16 and Link 22 PQC integration: message format constraints and protocol-level adaptation requirements
  • Satellite uplink protection: PQC for MILSATCOM, commercial SATCOM, and future protected waveforms
  • Key management for disconnected operations: pre-positioned keys, ephemeral key exchange, and resynchronisation
  • Hybrid deployment: maintaining interoperability with legacy allied tactical systems during migration

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Tactical Communications and Quantum Vulnerability Where PQC migration meets operational reality
  • Tactical communication layers: HF/VHF radio, UHF SATCOM, data links, IP mesh networks
  • Classical crypto in tactical systems: key exchange, authentication, and link encryption vulnerabilities
  • CNSA 2.0 timeline requirements for national security tactical communications
2 PQC for Constrained Military Platforms Performance, size, and power considerations
  • ML-KEM and ML-DSA on ARM Cortex-M4: cycles, memory, and power consumption benchmarks
  • FPGA and ASIC implementations: Xilinx/AMD and Intel Altera PQC acceleration options
  • Ciphertext and signature size impact: bandwidth analysis for each tactical channel type
  • Lattice-based versus hash-based tradeoffs: ML-DSA for speed versus SLH-DSA for conservative security
Break, after 60 min
3 Protocol-Level Integration Adapting military protocols for PQC
  • Link 16/22 PQC integration: MIDS terminal constraints and message format limitations
  • MILSATCOM protection: PQC for AEHF, Skynet 6, and commercial SATCOM backup channels
  • Mesh network key exchange: PQC in MANET routing protocols and ad hoc network formation
4 Interactive Demonstration PQC overhead modelling for a tactical network
  • Facilitator-led simulation of PQC deployment across a representative tactical network topology
  • Measuring latency, bandwidth, and battery impact with ML-KEM-768 and ML-KEM-1024 parameter sets
  • Identifying bottlenecks: which links and devices need protocol adaptation versus drop-in replacement
Break, after 90 min
5 Key Management for Disconnected Operations When the network is not always there
  • Pre-positioned key material: PQC key bundles for anticipated disconnected periods
  • Ephemeral key exchange on reconnection: minimising handshake overhead in intermittent connectivity
  • Allied interoperability: hybrid classical-PQC key exchange during multi-national coalition operations
6 Case Studies: Tactical PQC Deployments Early results from military communication programmes
  • Published PQC trials: US DoD tactical network pilots and UK MoD Morpheus programme considerations
  • NATO STANAG updates for post-quantum interoperability requirements
7 Q&A and Migration Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us